Attacking Scada Wireless Systems For Fun And Profit - And Fixing

ShmooCon IX - 2013

Presented by: Atlas, Cutaway
Date: Sunday February 17, 2013
Time: 12:00 - 12:50
Location: Regency B/C/D
Track: Belay It!

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The obscurity of <GHz wireless and other less-common comms has shrouded the level of in/security, but that shroud is lifting.

This talk will cover the current state of security for wireless SCADA comms, how to attack them, what that means, and some things we can do about it.

Atlas

Atlas is a doer of stuff. Inspired by the illustrious sk0d0, egged on by invisigoth of kenshoto, Atlas has done a lot of said 'stuff' and lived to talk about it. Whether he's breaking out of virtual machines, exploiting the AMI Power Meter's firmware(s), reversing medical equipment, or sending rogue routing frames in your FHSS SCADA systems, he's always entertaining, educational and fun. Originally from under a rock north of the mason-dixon, and raised by wolves, he enjoys pointing out poor assumptions and grokking the crap out of virtually everything.

Cutaway

Cutaway: Jack of All Trades and hardware attack dog for the InGuardians founders. I specialize in physical and information technology penetration testing, wireless assessments, architecture review, incident response/digital forensics, product research, hardware research, code review, security tool development, and the list goes on. I am currently focusing on hardware research specifically in the technologies surrounding products comprising the SMART GRID, SCADA and Medical industries with a focus on hardware and radio-based research, testing, risk assessment, and anything else you can think of with these technologies.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats